AI bots help us streamline tasks and troubleshoot problems in seconds. While they’re convenient, users must deal with many associated risks.
Sundown Sessions is more than an event; it is a gathering for Africa's brightest minds to unwind, network, and absorb insights from leaders in the fintech startup ecosystem.
With Kora's Identity APIs, you can verify customer IDs in Ghana, Nigeria, South Africa, and Nigeria. Create a smooth and secure KYC and KYB onboarding process for your business.
Want to expand your business in Africa? Here are tested and trusted expansion strategies to help you.
With Kora's Identity APIs, you can verify customer IDs in Ghana, Nigeria, South Africa, and Nigeria. Create a smooth and secure KYC and KYB onboarding process for your business.
The Kora Startup Kit is a directory of handpicked, pre-vetted companies we recommend to businesses like yours starting up in Africa.
Issue USD virtual cards for customers to pay for things online or their bills and also issue corporate cards for your business needs.
A post informing the general public about Kora's latest feature. Pay with Bank.
Advice for women in tech from women in tech.
How small businesses can keep their platforms safe from being used for fraud.
A 2023 fintech forecast from the POV of four fintech leaders.
Perspectives from engineering leaders at MTN, Microsoft and Kora.
Kora establishes ₦200 million endowment fund at Covenant University, starting with ₦30 million, to support students' education over ten years.
New product to help accelerate Africa’s participation in global trade.
Kora is now an ISO 27001 & ISO 22301-certified organization
We moved our URL address and updated our name. Read this to find out why.
In advertising, agencies always have to balance the client’s expectations and deliverables without overshooting the client’s budget. So, getting a tool that works was important. The first objective was to provide social media marketing services that delivered to client expectations while being cost-effective. So, they built a solution to cater to that need and now help other agencies get the same result for their clients, not just in Nigeria but worldwide.
To collect payments, Sadiq, the founder of the Ultimate Frisbee Club used Kora to create a payment link and shared it on the club’s WhatsApp group and it made the donations smooth and seamless. Using Kora also helped him build transparency because he could now export the finances of the community and share them with the rest of the organisers and sponsors.
Strategically using Kora to accept payments in Ghana, Detail Africa embraces a pan-African perspective. The move aligns with the company's expansion plans, demonstrating a commitment to reaching new markets across the continent.
How Oystr Finance is unlocking credit for Africa's unbanked.
For our International Women's Month series, #EmbraceEquality, here's Adetola, the Head of Sales & Partnerships at Kora.
For our International Women's Month series, #EmbraceEquity, here's Adefere, a lawyer at Kora.
For our International Women's Month series, #EmbraceEquity, here's Nnenna, a merchant success associate at Kora.
If you research what security experts consider a “strong” password, you’ll find several different ideas. Most agree they should be long, yet no one seems to agree on how long. Some recommend using a mix of symbols and numbers, while others argue this makes passwords too difficult to remember. However, everyone does agree on one fact: Password strength is a vital part of security.
Criminals have taken a liking to targeting us through employees in our organisations. Even management isn't immune to their shenanigans like phishing, where they send you deceptive emails that look innocent. But beware, even your coworker's email could be under siege. So, here's a rule of thumb: if someone's asking for your PIN, bank info, or login details, it's time to raise an eyebrow.
Data breaches can occur in various ways, including through hacking, malware, phishing attacks, physical theft, or accidental exposure. When a data breach happens, it often results in the exposure, theft, or compromise of personal, financial, or sensitive information, which can have serious consequences for individuals, organisations, or even governments. Here is how to protect youself.
A guide to understanding internet cookies.